On Wed, 2024-07-24 at 06:51 +0000, Dhairya Nagodra via lists.openembedded.org 
wrote:
> 
> 
> > -----Original Message-----
> > From: Marko, Peter <peter.ma...@siemens.com>
> > Sent: Wednesday, July 24, 2024 12:04 PM
> > To: Dhairya Nagodra -X (dnagodra - E-INFO CHIPS INC at Cisco)
> > <dnago...@cisco.com>; openembedded-core@lists.openembedded.org
> > Cc: xe-linux-external(mailer list) <xe-linux-exter...@cisco.com>
> > Subject: RE: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' to
> > "Unpatched" status
> > 
> > -----Original Message-----
> > From: openembedded-core@lists.openembedded.org <openembedded-
> > c...@lists.openembedded.org> On Behalf Of Dhairya Nagodra via
> > lists.openembedded.org
> > Sent: Wednesday, July 24, 2024 6:45
> > To: openembedded-core@lists.openembedded.org
> > Cc: xe-linux-exter...@cisco.com; Dhairya Nagodra <dnago...@cisco.com>
> > Subject: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' to
> > "Unpatched" status
> > 
> > > - The 'upstream-wontfix' is to be used when the CVE is accepted by the
> > >   upstream, but they are not planning to fix it.
> > > - If the version used in Yocto is vulnerable, it should not have
> > >   "Ignored" status. The package is still exploitable by the CVE.
> > > - Also, when the status is exported out of the SDK, it would be
> > >   incorrect to put it under Ignored catgory.
> > 
> > The purpose of this entry is to remove meaningless CVEs from reports so that
> > users don't spend countless hours over and over again on analyzing "open"
> > CVEs if they were already closed upstream.
> 
> I understand the need to remove the meaningless CVEs from the report and 
> prevention of re-analysing the CVEs.
> And for that exact reason we have the CVE_STATUS, the CVEs would be reported 
> as vulnerable or "open" yes, but the previous analysis would also be present 
> in CVE_STATUS.
> This should give the context to the person and not requiring them to 
> re-analyse the CVE.
> 
> Also, I would re-iterate the point that when the status of CVEs is exported 
> out of the SDK, they would be falsely reported under 'Ignored' category.

This is far from straightforward unfortunately.

Some people are using these lists as "are there any issues we need to
worry about?".

In that context, if an upstream has assessed a CVE and decided nothing
need be done about it, our decision to "ignore" it is correct as there
is nothing to be done.

On the other hand, the CVE is open and unpatched, so listing it as
unmitigated is also correct in some senses. The problem is that there
is no planned way of moving forward with the CVE, so it will sit in a
list of other "unpatched" CVEs and this dilutes the value of the list
as you can't tell which ones are being rejected by upstream as wontfix
and which ones are real and need attention.

We knew that people would have different views and needs on how to
handle this, which is precisely why the mapping variables exist. You
can certainly configure this according to your needs and this may be a
case where you'd need to do that as there isn't going to be a 100%
right answer we can have.

Cheers,

Richard

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#202430): 
https://lists.openembedded.org/g/openembedded-core/message/202430
Mute This Topic: https://lists.openembedded.org/mt/107518628/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to